On bidder zones, cell phones and ballot stuffing
نویسندگان
چکیده
Ballot stuffing is the process of illegitimately creating a good reputation and requires a number of colluding fraudsters. With the use of an anonymising network, a single user could pose as many separate users and possibly implement the ballot stuffing scheme without the complexities of managing multiple fraudsters. In this paper we propose a framework that deals with thwarting ballot stuffing within the context of anonymising networks. The framework proposed depends on the ability to look up a single user’s physical location with a fair degree of certainty. With this mechanism in place, the framework is able to compare the locations of all users involved in a transaction. If the coordinates are within close proximity to one another (this is unlikely in a global trading system) then the transaction is tagged accordingly. The framework proposed does not necessarily apply to only thwarting ballot stuffing schemes, we discuss the fundamental problem of using anonymising networks to commit ballot stuffing and analyse another scheme (ticket scalping) that may be thwarted with this framework.
منابع مشابه
Fraud detections for online businesses: a perspective from blockchain technology
Results: The detection of fraudulent raters is not easy since they can behave strategically to camouflage themselves. We explore the potential strengths and limitations of blockchain-based reputation systems under two attack goals: ballot-stuffing and bad-mouthing, and various attack models including constant attack, camouflage attack, whitewashing attack and sybil attack. Blockchain-based repu...
متن کاملProtecting Against Privacy Compromise and Ballot Stuffing by Eliminating Non-Determinism from End-to-end Voting Schemes
End-to-end voting schemes have been researched significantly over the past two decades and aim to establish voter verifiable elections. Many of these schemes rely on non-deterministic inputs, such as the randomness used in encryption, for several tasks in the voting process. Karlof et al. show that the randomness in a scheme by Neff enables potential malicious subliminal channels. We revist the...
متن کاملCountering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios
Helios is a web-based end-to-end verifiable electronic voting system which has been said to be suitable for low-coercion environments. Although many Internet voting schemes have been proposed in the literature, Helios stands out for its real world relevance. It has been used in a number of elections in university campuses around the world and it has also been used recently by the IACR to elect ...
متن کاملEvaluation of the Interference of the Microwave Radiation Emitted from GSM Mobile Phones on the Performance of Cell Counters
Abstract Background and Objectives: Incidents related to electromagnetic interference with medical devices have been reported over the past decades. It has also been indicated that the microwave radiation emitted from mobile phones interferes with the operation of medical devices therefore, this study aimed at testing the interference by GSM mobile phones with cell counters. Material and Method...
متن کاملComparison of Usability of Touch-screen and Button Cell Phones Among Elderly Users
Background and Objectives: The use of new technologies, particularly mobile phones, is drastically growing on a daily basis. The usability of mobile phones can be determined for different age groups in order to reach a balanced development plan with respect to this technology. The present study aimed to investigate and compare the usability of touch-screen and button cell phones among Iranian e...
متن کامل